**What is Public Key Encryption **

Before reading this article I hope you have already gone through my article about **What is Encryption? **Now let’s talk about the public key encryption. This method is quite common. And in most encryption, whether it is email or general message, or Whatsapp App Encryption, public key encryption is used. Now, what is this public key encryption?

Think I’m a user and you’re a user. Each of us has two keys. In that case, I also have two keys. One is the private key, which is only with me and the other is my public key, which everyone has. And that’s what you have. There will be a private key, which will be with you only, and the other will be the key, which everyone will have.

## what is the key?

Think I’m a user and you’re a user. Each of us has two keys. In that case, I also have two keys. One is the private key, which is only with me and the other is my public key, which everyone has. And that’s what you have. There will be a private key, which will be with you only, and the other will be the key, which everyone will have. Now again a question, what is the key? What is meant here is the formula for encrypted data de-code in this key. That is, the key is to describe how a message can be converted into an original message. Now let’s learn some important things about the public key and the key.

What is meant here is the formula for encrypted data de-code in this key. That is, the key is to describe how a message can be converted into an original message. Now let’s learn some important things about the public key and the key.

## Example :

Suppose you locked a message using a public key. So it is possible to open the message only through the private key. Again, if you lock a message with the private key, it can be opened only by using the public key. Insert this formula well inside the head before understanding more details. Now, I think another user should send a message to “Hello”. So what I will do, another user will have their public key (which is kept by everyone) with the public key, encrypted my message “Hello” and send it to him. The user will be able to open the message I sent just by using his private key. If anyone gets the message in the middle of it, he will not be able to open it.

Suppose you locked a message using a public key. So it is possible to open the message only through the private key. Again, if you lock a message with the private key, it can be opened only by using the public key. Insert this formula well inside the head before understanding more details. Now, I think another user should send a message to “Hello”. So what I will do, another user will have their public key (which is kept by everyone) with the public key, encrypted my message “Hello” and send it to him. The user will be able to open the message I sent just by using his private key. If anyone gets the message in the middle of it, he will not be able to open it.

Just like this, if I want to secure this message a bit more and if I want to make sure that the message I sent (the public key to everyone, the person can send the message using it), firstly the public key of the user. I want to send the message to Lock the message with the key and then the second time I will lock the message with my private key. When the message goes to that user, he will see that “Oh this message is locked by private key”, then he will unlock the message using my public key near him and then using his own private key will unlock the message completely.

The subject matter is a bit of a problem, but hopefully, this paragraph will be cleaned all the time after 2-3 times. In other words, it is possible to decrypt the public key by the key and by the key encryption public key. And it works on this formula. This key formula is basically used to transmit any data. For example, if you have logged in an account or sending regular messages to someone, etc., then your data is secured using this method.

## But how are the securities that are already stored in the stores?

For example, you have uploaded many photos to Google Drive or Dropbox or saved your credit card information on different websites. So to get rid of all these data, there is a help-table approach. Now, what is this hash table? For example, my name is “TechForLive”. Now I have saved my name on different websites.

But if I save using the hash table system, my name will not be saved directly as “TechForLive”. Rather, they will be saved in a different sense by composing a lot of text together. And its recovery can be done again by a key. And the key is only for that website. Generally, these types of data are decoded as impossible. But then there is nothing called Impossible in the world of science and technology. Experts are always concerned about how to get information from any place. So there is a rough run on both sides, those security experts think of saving more of their data, and those D-code experts, they always try to find the wrong errors of the encryption. Generally speaking, these forms of encryption are used more often. But when using most encryption, the public encryption formula is used. Even the latest WhatsApp App’s end-to-end encryption system is also revealed as a public key encryption.

Where each user has two keys, where for the public key and for the private key itself. Locking anything using the public key will open it only with your private key and using the private key, it will only open the public key.